Date: Wed, 5 Dec 2001 13:47:09 -0600 From: Rob Andrews <rob@switchblade.cyberpunkz.org> To: "David W. Chapman Jr." <dwcjr@inethouston.net> Cc: FreeBSD Security Advisories <security-advisories@FreeBSD.ORG>, security@FreeBSD.ORG Subject: Re: FreeBSD Security Advisory: FreeBSD-SA-01:63.openssh Message-ID: <20011205134709.A71719@switchblade.cyberpunkz.org> In-Reply-To: <20011205194053.GB78905@leviathan.inethouston.net>; from dwcjr@inethouston.net on Wed, Dec 05, 2001 at 01:40:53PM -0600 References: <200112041726.fB4HQbA05231@freefall.freebsd.org> <20011205194053.GB78905@leviathan.inethouston.net>
next in thread | previous in thread | raw e-mail | index | archive | help
--CE+1k2dSO48ffgeK Content-Type: text/plain; charset=us-ascii Content-Disposition: inline On Wed, Dec 05, 2001 at 01:40:53PM -0600, David W. Chapman Jr. wrote: > Does this also apply to the openssh-portable port? > > In addition, there are two versions of OpenSSH included in the > > ports collection. One is ports/security/openssh, which is the > > BSD-specific version of OpenSSH. Versions of this port prior to > > openssh-3.0.2 exhibit the problem described above. The other is > > ports/security/openssh-portable, which is not vulnerable, even if the > > server is set to `UseLogin yes'. The answer to your question was right here in the advisory.. Rob Andrews Admin | Owner http://cyberpunkz.org/ rob@cyberpunkz.org --CE+1k2dSO48ffgeK Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE8Dnm9AXwJ9YLqJJURAgYHAJ4rUXR5Km0GBVACZW5VjULhy0k9qQCbBeMi TKVEjuRgU09xzIEOFnvePH4= =+2AZ -----END PGP SIGNATURE----- --CE+1k2dSO48ffgeK-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011205134709.A71719>